TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Preventing SQL Injections When WAF’s Not Enough

18 pointsby ninegunpiover 6 years ago

4 comments

dullgiulioover 6 years ago
Umh, this article is dubious.<p>1. If your WAF can be fooled by adding a X-Forwarded-For header, trouble ahead.<p>2. If your security strategy is about mitigating attacks where the payload matches some regular expressions, trouble ahead. Machine learning? Double trouble ahead.<p>3. If you don&#x27;t write only completely static queries[1] to then use as prepared statements or use a proper ORM[2] when using a SQL database, trouble ahead.<p>[1] <a href="https:&#x2F;&#x2F;www.akadia.com&#x2F;services&#x2F;dyn_modify_where_clause.html" rel="nofollow">https:&#x2F;&#x2F;www.akadia.com&#x2F;services&#x2F;dyn_modify_where_clause.html</a><p>[2] Like linq, jOOQ...
评论 #19158167 未加载
all_blue_chucksover 6 years ago
WAF&#x27;s are never good enough. They&#x27;re a weak band-aid used by companies who lack the expertise to find and fix security bugs in their own code.
评论 #19155835 未加载
risover 6 years ago
This is an advertisement.
moutixover 6 years ago
That&#x27;s why we now have RASP. It&#x27;s better than SQL proxy and WAF, because you have both the SQL query and the HTTP parameters and you can correlate them to be super accurate
评论 #19169928 未加载